Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Proceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000

20-23 Nov. 2000

Filter Results

Displaying Results 1 - 25 of 30
  • Proceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 340
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Generic invariant-based static analysis tool for detection of runtime errors in Java programs

    Publication Year: 2000, Page(s):36 - 44
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    The paper presents an invariant-based generic tool to statically analyze Java programs in order to detect potential errors (bugs). We briefly discuss the supporting theoretical framework and highlight the results of the tool. It can automatically detect potential bugs such as illegal dereference and array bounds and report them before the program is executed. For a Java class, invariants related t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An event-based framework for converged service provisioning

    Publication Year: 2000, Page(s):24 - 34
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    The paper describes an object-oriented event-based framework for provisioning services for the converging telecommunications networks and the Internet. The DOORS (distributed object operations) framework attempts to address several issues in protocol development, interoperability and distributed computing in heterogenous networks and telecommunications systems. The framework highlights a generic s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for the design and development of distributed applications using UML

    Publication Year: 2000, Page(s):253 - 264
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    Presents a design and development method for distributed applications running on top of advanced object-oriented middleware platforms. We introduce the basic concept of the distinction between a set of concepts and their relations, the definition of a notation supporting such concepts and rules for automatic code generation that help to provide a smooth transition from the design step to the imple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbol table construction and name lookup in ISO C++

    Publication Year: 2000, Page(s):57 - 68
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    The authors present an object oriented model of symbol table construction and name lookup for ISO C++ using the Unified Modeling Language (UML). Our use of UML class, activity and sequence diagrams serves to explicate our model and our use of patterns such as decorator and facade increase the understandability of the model. Clause three of the ISO C++ standard describes the procedures and rules fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study of framework design for horizontal reuse

    Publication Year: 2000, Page(s):278 - 289
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    In this experience report, we present a case study in designing, implementing and reusing an object-oriented framework for constructing and editing complex search expressions over arbitrary data domains. We present a framework design that achieves a large degree of business domain decoupling through the application of design patterns. We outline the reuse process and analyse and classify the probl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tool support for systematic class identification in object-oriented software architectures

    Publication Year: 2000, Page(s):82 - 93
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    Software architectures have received considerable attention in both research and practice for representing system stakeholder concerns, and many researchers have leveraged object oriented models and methods for software architecture representation and evaluation. While the benefits associated with object oriented approaches are closely aligned with desirable qualities for software architectures (e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prioritising use cases and scenarios

    Publication Year: 2000, Page(s):108 - 119
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    Use cases (J. Rumbaugh et al., 1997) are currently used in requirements elicitation and analysis. They describe in natural language the complete functionality of a proposed system. In most projects, the amount of detail put into eliciting and documenting a use case is usually dependent on the time and resources available. Seldom is there enough time to fully expand all the use cases. Thus, only a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model for the migration to object-oriented software development with special emphasis on improvement of acceptance

    Publication Year: 2000, Page(s):132 - 143
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    Object oriented technology has been established as an important new paradigm in software development. Thus, many organizations involved in any kind of software production plan to migrate to object oriented technology or have already started this process. Besides several successful migrations, many failures occur. In order to reduce the risk of failure during the migration process, we developed a m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An asynchronous message exchange system on CORBA

    Publication Year: 2000, Page(s):14 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Data exchange by networks is becoming more important due to the growth of the Internet. One popular architectural style for distributed, loosely-coupled, heterogeneous network systems is a structure based on event generation, observation and notification. Based on the event service and naming service defined by OMG (Object Management Group), we build an efficient and Internet-scale event-driven da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling interface definition language extensions

    Publication Year: 2000, Page(s):242 - 252
    Cited by:  Papers (4)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    Interface definition languages (IDLs) serve to specify module and interface names, as well as operation signatures. However, IDLs lack a means to express aspects, such as synchronization constraints, pre- and post-conditions, invariants, quality-of-service annotations and real-time annotations. We develop a framework to specify the IDL and a given IDL extension in a combined modeling language base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transforming UML static models into object-oriented code

    Publication Year: 2000, Page(s):170 - 181
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    The authors propose a reuse based rigorous method using UML and algebraic specifications. Our contribution is towards an embedding of the object oriented code generation within a rigorous process that facilitates reuse, evolution and maintenance of the software. In previous work we described the GSBLOO language (L. Fevre and S. Clerici, 1999) to cope with the formalization of UML static... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • YooccLa: a parser generator for L-attributed grammars

    Publication Year: 2000, Page(s):214 - 225
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    Argues that a parser generator can be developed that: (1) can bring parser technology within the reach of more software engineers, (2) requires less knowledge of parser technology than most existing parser generators, and (3) can allow a parser to be used where a designer might otherwise have chosen a fully procedural solution. A parser generator, called YooccLa (Yes! An Object-Oriented Compiler C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Java Multi-Method Framework

    Publication Year: 2000, Page(s):45 - 56
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    In Java, method resolution is done at runtime, by late-binding, with respect to the dynamic type of the target object. Some object-oriented languages such as CLOS propose, in addition, late-binding according to dynamic types of arguments. This feature is known as multi-polymorphism and usually achieved by multi-methods. We propose a pure Java framework that provides multi-methods, without extendin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic components to foster reuse

    Publication Year: 2000, Page(s):266 - 277
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    Software reuse, and especially the paradigm of software components, is a promising approach to increase the efficiency of software development. One of the basic problems of software reuse, however, is the trade-off between the abstraction from project-specific aspects on the one side, and the actual contribution of a reusable component during the realization of a new system on the other side. Conv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Problem frames and object-oriented software architecture

    Publication Year: 2000, Page(s):70 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    The paper attempts to marry object oriented software architecture with M. Jackson's (1995) “problem frames”. Jackson's problem frames follow from his perception that many systemic problems in modern software development can be addressed by a greater problem space orientation during system specification and analysis, and a clearer separation of problem and solution space concerns during... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic team structures for supporting software design episodes

    Publication Year: 2000, Page(s):290 - 301
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    Much software design and development is still performed from inside hierarchically structured development organisations. Hierarchy permeates many traditional organisations - the line of military command, the relationship between a surgeon and the attending staff, and the interactions between workers and operations managers on an industrial assembly line are examples. The design of any piece of int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-calibration of metrics of Java methods

    Publication Year: 2000, Page(s):94 - 106
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    Self-calibration is a new technique for the study of internal product metrics, sometimes called “observations” and calibrating these against their frequency, or probability of occurring in common programming practice (CPP). Data gathering and analysis of the distribution of observations is an important prerequisite for predicting external qualities, and in particular software complexit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eliciting security requirements by misuse cases

    Publication Year: 2000, Page(s):120 - 131
    Cited by:  Papers (79)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Use case diagrams (L. Jacobson et al., 1992) have proven quite helpful in requirements engineering, both for eliciting requirements and getting a better overview of requirements already stated. However, not all kinds of requirements are equally well supported by use case diagrams. They are good for functional requirements, but poorer at e.g., security requirements, which often concentrate on what ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • More meaningful UML models

    Publication Year: 2000, Page(s):146 - 157
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    UML is widely used today for modelling complex systems. However, the tool support capabilities for UML is limited, partially due to its lack of precise semantics. There are some approaches that try to solve this by defining a formal semantics for UML, nonetheless it usually proves hard to implement the corresponding dynamic semantics. The paper presents an approach to define an executable semantic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of CORBA-based Subscription Server

    Publication Year: 2000, Page(s):2 - 13
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    The standard CORBA operation invocation model supports synchronous, one-way, and deferred synchronous interactions between clients and servers. However, this model is too restrictive for real-time applications. In particular, the model lacks asynchronous message delivery, does not support timed invocations or group communication, and can lead to excessive polling by clients. We have designed and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On mathematical foundations for business modeling

    Publication Year: 2000, Page(s):182 - 187
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    Presents sketch-answers to the following three questions. (1) What is a business domain, mathematically? (2) What is a business model of business domain, mathematically? (3) What is the mathematical machinery suitable for building and manipulating business models? These questions may be answered as follows. (1) Any given business domain D is (mathematically) a topos, i.e. a particular case of a qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Container-managed messaging: an architecture for integrating Java components and message-oriented applications

    Publication Year: 2000, Page(s):228 - 241
    Cited by:  Papers (2)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    Container-managed messaging (CMM) allows a Java component to communicate via messaging without having to manage the messaging infrastructure, similarly to how container-managed persistence (CMP) allows an EJB (Enterprise JavaBean) to have persistent data without managing access to a data store. In addition, messaging parameters (such as destinations, mode of interaction, time-outs, etc.) can be de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding frameworks through visualisation

    Publication Year: 2000, Page(s):304 - 315
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1016 KB)

    Object oriented frameworks can significantly improve productivity. However, learning how to use them effectively is a well-known, difficult problem. We discuss the issues related to this problem, and describe the design and development of a prototype framework visualisation system intended to help solve the problem View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.